A code execution vulnerability exists in the XiaomiGetApps application product. This vulnerability is caused by the verification logic being bypassed, and an attacker can exploit this vulnerability to execute malicious code.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://trust.mi.com/misrc/bulletins/advisory?cveId=545 |
![]() ![]() |
History
Thu, 09 Jan 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-94 |
Thu, 29 Aug 2024 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Xiaomi Security Center expresses heartfelt thanks to Ken Gannon and Ilyes Beghdadi of NCC Group working with Trend Micro Zero Day Initiative! At the same time, we also welcome more outstanding and professional security experts and security teams to join the Mi Security Center (MiSRC) to jointly ensure the safe access of millions of Xiaomi users worldwide Life. | A code execution vulnerability exists in the XiaomiGetApps application product. This vulnerability is caused by the verification logic being bypassed, and an attacker can exploit this vulnerability to execute malicious code. |
Wed, 28 Aug 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Xiaomi
Xiaomi getapps Application |
|
Weaknesses | CWE-94 | |
CPEs | cpe:2.3:a:xiaomi:getapps_application:*:*:*:*:*:*:*:* | |
Vendors & Products |
Xiaomi
Xiaomi getapps Application |
|
Metrics |
ssvc
|
Wed, 28 Aug 2024 11:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A code execution vulnerability exists in the XiaomiGetApps application product. This vulnerability is caused by the verification logic being bypassed, and an attacker can exploit this vulnerability to execute malicious code. | The Xiaomi Security Center expresses heartfelt thanks to Ken Gannon and Ilyes Beghdadi of NCC Group working with Trend Micro Zero Day Initiative! At the same time, we also welcome more outstanding and professional security experts and security teams to join the Mi Security Center (MiSRC) to jointly ensure the safe access of millions of Xiaomi users worldwide Life. |
Wed, 28 Aug 2024 07:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Xiaomi Security Center expresses heartfelt thanks to Ken Gannon and Ilyes Beghdadi of NCC Group working with Trend Micro Zero Day Initiative! At the same time, we also welcome more outstanding and professional security experts and security teams to join the Mi Security Center (MiSRC) to jointly ensure the safe access of millions of Xiaomi users worldwide Life. | A code execution vulnerability exists in the XiaomiGetApps application product. This vulnerability is caused by the verification logic being bypassed, and an attacker can exploit this vulnerability to execute malicious code. |
Wed, 28 Aug 2024 07:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Xiaomi Security Center expresses heartfelt thanks to Ken Gannon and Ilyes Beghdadi of NCC Group working with Trend Micro Zero Day Initiative! At the same time, we also welcome more outstanding and professional security experts and security teams to join the Mi Security Center (MiSRC) to jointly ensure the safe access of millions of Xiaomi users worldwide Life. | |
Title | GetApps application has code execution vulnerability | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Xiaomi
Published:
Updated: 2025-01-09T17:40:39.917Z
Reserved: 2024-08-28T02:24:34.837Z
Link: CVE-2024-45346

Updated: 2024-08-28T13:44:57.859Z

Status : Awaiting Analysis
Published: 2024-08-28T07:15:08.823
Modified: 2025-01-09T18:15:28.703
Link: CVE-2024-45346

No data.